mgrube / DragonKingLinks
Open Source Rootkit
☆22Updated 7 years ago
Alternatives and similar repositories for DragonKing
Users that are interested in DragonKing are comparing it to the libraries listed below
Sorting:
- Anti-AV compilation☆44Updated 11 years ago
- 🐧 A simple kernel-level rootkit☆20Updated 9 years ago
- PCAUSA Rawether for Windows Local Privilege Escalation☆38Updated 8 years ago
- Bootkits Revisited☆40Updated 11 years ago
- Malware monitor template based on MinHook☆16Updated 10 years ago
- Scanning and identifying XOR encrypted PE files in PE resources☆28Updated 11 years ago
- ☆34Updated 7 years ago
- fun rootkits stuff!☆18Updated 9 years ago
- ☆23Updated 9 years ago
- Windows hard shutdown shellcode. Don't need administrator rights.☆13Updated 9 years ago
- ☆28Updated 8 years ago
- ☆18Updated 8 years ago
- Alina POS Source Code + Rootkit☆23Updated 9 years ago
- Common Malware Techniques☆13Updated 2 years ago
- just a basic rootkit for learning how to playing sys_call_table☆14Updated 8 years ago
- Obtain remote process cookies by performing a brute-force attack on ntdll.RtlDecodePointer using known pointer encodings.☆22Updated 8 years ago
- ☆16Updated 7 years ago
- CVE-2014-0816☆25Updated 8 years ago
- PoC for Bypassing UM Hooks By Bruteforcing Intel Syscalls☆38Updated 9 years ago
- Kernel mode windows NT API logger☆22Updated 5 years ago
- HackSys Extreme Vulnerable Driver - StackOverflow with Stack Cookie Bypass Exploit☆19Updated 8 years ago
- find and kill injectedThreads from memory☆12Updated 9 years ago
- Application for random attack on Green Petya's key☆23Updated 8 years ago
- Anti-technique Codes, Detection of Anti-technique codes☆38Updated 11 years ago
- A simple Windows driver which crashes the system and turns the BSOD pink☆19Updated 9 years ago
- Code Injector Using Code Caves☆15Updated 10 years ago
- Malware analyses and helpful scripts☆29Updated 3 years ago
- If you want to exploit some kernel overflows, I've designed (long time ago) several levels ; have fun!☆8Updated 13 years ago
- Malware Analysis, Anti-Analysis, and Anti-Anti-Analysis☆45Updated 7 years ago
- Bypass antivirus with dynamic import. Hide the api(s) used.☆27Updated 9 years ago